Improving performance of robots using human-inspired approaches: a survey

H Qiao, S Zhong, Z Chen, H Wang - Science China Information Sciences, 2022 - Springer
Realizing high performance of ordinary robots is one of the core problems in robotic
research. Improving the performance of ordinary robots usually relies on the collaborative …

Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

[HTML][HTML] Using protection motivation theory in the design of nudges to improve online security behavior

R Van Bavel, N Rodríguez-Priego, J Vila… - International Journal of …, 2019 - Elsevier
We conducted an online experiment (n= 2024) on a representative sample of internet users
in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on …

Online instrument delivery and participant recruitment services: Emerging opportunities for behavioral accounting research

DM Brandon, JH Long, TM Loraas… - Behavioral …, 2014 - publications.aaahq.org
Behavioral accounting researchers have historically been constrained in their ability to
reach externally valid research participants. The purpose of this paper is to familiarize …

Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda

PB Lowry, T Dinev, R Willison - European Journal of Information …, 2017 - Taylor & Francis
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …

“Security begins at home”: Determinants of home computer and mobile device security behavior

N Thompson, TJ McGill, X Wang - computers & security, 2017 - Elsevier
Personal computing users are vulnerable to information security threats, as they must
independently make decisions about how to protect themselves, often with little …

The impact of information security threat awareness on privacy-protective behaviors

S Mamonov, R Benbunan-Fich - Computers in Human Behavior, 2018 - Elsevier
In this study, we examine how to motivate computer users to protect themselves from
potential security and privacy threats. We draw on the Information Processing framework …

A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach

J Mou, JF Cohen, A Bhattacherjee… - Journal of the Association …, 2022 - aisel.aisnet.org
Abstract Information security is one of the important domains of information systems
research today, with protection motivation theory (PMT) one of its most influential theoretical …

The phishing funnel model: a design artifact to predict user susceptibility to phishing websites

A Abbasi, D Dobolyi, A Vance… - Information Systems …, 2021 - pubsonline.informs.org
Phishing is a significant security concern for organizations, threatening employees and
members of the public. Phishing threats against employees can lead to severe security …

Employees' in-role and extra-role information security behaviors from the PE fit perspective

Y Yin, C Hsu, Z Zhou - Computers & Security, 2023 - Elsevier
Organizations are increasingly seeking ways to encourage employee in-role and extra-role
information security (InfoSec) behaviors for enhancing organizational InfoSec. One …